Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols
نویسندگان
چکیده
Many organisations enforce policies on the length and formation of passwords to encourage selection of strong passwords and protect their multi-user systems. For Two-Server Password Authenticated Key Exchange (2PAKE) and Two-Server Password Authenticated Secret Sharing (2PASS) protocols, where the password chosen by the client is secretly shared between the two servers, the initial remote registration of policy-compliant passwords represents a major problem because none of the servers is supposed to know the password in clear. We solve this problem by introducing Two-Server Blind Password Registration (2BPR) protocols that can be executed between a client and the two servers as part of the remote registration procedure. 2BPR protocols guarantee that secret shares sent to the servers belong to a password that matches their combined password policy and that the plain password remains hidden from any attacker that is in control of at most one server. We propose a security model for 2BPR protocols capturing the requirements of policy compliance for client passwords and their blindness against the servers. Our model extends the adversarial setting of 2PAKE/2PASS protocols to the registration phase and hence closes the gap in the formal treatment of such protocols. We construct an efficient 2BPR protocol for ASCII-based password policies, prove its security in the standard model, give a proof of concept implementation, and discuss its performance.
منابع مشابه
Universally Composable Two-Server PAKE
Two-Server Password Authenticated Key Exchange (2PAKE) protocols apply secret sharing techniques to achieve protection against server-compromise attacks. 2PAKE protocols eliminate the need for password hashing and remain secure as long as one of the servers remains honest. This concept has also been explored in connection with two-server password authenticated secret sharing (2PASS) protocols f...
متن کاملZero-Knowledge Password Policy Checks and Verifier-Based PAKE
Zero-Knowledge Password Policy Checks (ZKPPC), introduced in this work, enable blind registration of client passwords at remote servers, i.e., client passwords are never transmitted to the servers. This eliminates the need for trusting servers to securely process and store client passwords. A ZKPPC protocol, executed as part of the registration procedure, allows clients to further prove complia...
متن کاملAdvancements in Password-based Cryptography
Password-based authentication is the most popular authentication mechanism for humans today, not only on the internet. Despite increasing efforts to move to supposedly more secure alternatives, password-based authentication is most likely to stay for the foreseeable future due to its user experience and convenience. However, although secure cryptographic protocols for password-based authenticat...
متن کاملA Review: PAKE Security for Distributed Environment
With the advancement of technology, communications today should be secured by secret session key. A password-authenticated key agreement method is an interactive password based method to establish secret session keys. A number of protocols for Password based Authentication and Key Exchange (PAKE) is designed for the single server environment where each user shares a password with a server. Thes...
متن کاملThreshold Password-based Authenticated Key Exchange using Matrix
Authentication protocols rely on the possession of keys by the parties to be authenticated. For security, keys must be chosen randomly and have to have a long length from 100 bits to thousands of bits. But such keys are difficult to memorize for humans. Password-based authenticated key exchange protocols offer an efficient method to achieve an authentication and a secure communication between t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016